Identity Management

Updated: 2026-02-17

Plain English Translation

ISO 27001 Annex A.5.16 requires organizations to strictly manage the entire lifespan of a digital identity, from the moment it is created (provisioning) to the moment it is deleted (deprovisioning). This applies not only to human employees but also to non-human identities like service accounts and bots. The goal is to ensure that only valid, authorized entities exist within your systems, eliminating 'ghost' accounts that could be exploited by attackers.

Executive Takeaway

Identity is the new security perimeter; managing the creation, maintenance, and deletion of user and system accounts is critical to preventing unauthorized access.

ImpactHigh
ComplexityMedium

Why This Matters

  • Prevents unauthorized access through dormant or orphaned accounts from former employees
  • Ensures accountability by linking every action in the system to a unique, managed identity

What “Good” Looks Like

  • Automated provisioning and de-provisioning linked to HR systems (tools like WatchDog Security's Compliance Center can help track required evidence for joiner/mover/leaver workflows and highlight gaps before audits).
  • Regular reviews of service accounts and non-human identities to ensure they are still required (tools like WatchDog Security's Asset Inventory can help maintain visibility into where these identities exist across environments for easier review and cleanup).

It is an organizational control that mandates the management of the full lifecycle of identities, ensuring that digital identities are created, maintained, and removed securely.

The objective is to ensure that only authorized entities (human or non-human) have identities in the system and that these identities are removed immediately when no longer needed.

It involves the formal processes of registration (creation), provisioning (access assignment), maintenance (updates/changes), and de-provisioning (deletion/revocation) of identities.

Without managed identities, you cannot enforce access control (A.5.15) or accountability; unmanaged identities are a primary vector for breaches and insider threats.

A.5.16 manages the 'Subject' (the identity), while A.5.15 defines the 'Rules' for access, and A.5.18 manages the 'Privileges' assigned to that identity.

The 2022 version explicitly separates 'Identity Management' (A.5.16) from 'Access Rights' (A.5.18), placing greater emphasis on the lifecycle of the identity itself and including non-human actors.

Yes, it applies to service accounts, APIs, bots, and other technical identities, which must be managed with the same rigor as human users.

Common challenges include 'orphan' accounts left behind after termination, lack of visibility into service accounts, and manual, error-prone provisioning processes.

You need an Access Control Policy covering identity lifecycle, records of onboarding/offboarding (checklists), and logs showing identity creation and deletion.

By enforcing a policy that prohibits shared accounts and using technical controls (like SSO) to ensure each human or system has a unique, traceable identifier.

A.5.16 often fails in practice because teams lose visibility into where identities exist across cloud, SaaS, and infrastructure, leading to dormant or orphaned accounts. WatchDog Security's Asset Inventory helps by mapping identities to assets and services across environments, making it easier to spot accounts that no longer align to an active person, role, or system workload and prioritize cleanup.

Auditors typically want repeatable proof that identity lifecycle steps exist (joiner/mover/leaver) and that reviews happen on schedule, not just policy text. WatchDog Security's Compliance Center helps organize this by tracking the control status, flagging gaps (like missing access reviews or incomplete offboarding evidence), and centralizing supporting artifacts so teams can show consistent evidence of identity governance over time.

ISO-27001 A.5.16

"The full life cycle of identities shall be managed."

VersionDateAuthorDescription
1.0.02026-02-17WatchDog Security GRC TeamInitial publication